{"id":5790,"date":"2019-03-22T14:32:37","date_gmt":"2019-03-22T11:32:37","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5790"},"modified":"2019-11-15T14:31:36","modified_gmt":"2019-11-15T11:31:36","slug":"mirai-enterprise","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/mirai-enterprise\/5790\/","title":{"rendered":"Mirai \u015eirketleri hedef al\u0131yor"},"content":{"rendered":"<p>Ge\u00e7ti\u011fimiz g\u00fcnlerde <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-mirai-variant-comes-with-27-exploits-targets-enterprise-devices\/\" target=\"_blank\" rel=\"noopener nofollow\">Mirai\u2019nin yeni bir versiyonu<\/a> ile ilgili bir haber g\u00f6rd\u00fck (Mirai, IoT cihazlar\u0131n\u0131 hedef alan ve kendi kendine \u00e7o\u011falabilen bir botnettir ve 2016 y\u0131l\u0131nda <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/attack-on-dyn-explained\/2629\/\" target=\"_blank\" rel=\"noopener\">Dyn sunucular\u0131na yap\u0131lan<\/a> b\u00fcy\u00fck \u00e7apl\u0131 DDoS sald\u0131r\u0131lar\u0131n\u0131n da sorumlusudur). Analistlere g\u00f6re bu botnet, \u00e7ok daha geni\u015f bir yelpazedeki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanan yaz\u0131l\u0131mlarla donat\u0131lm\u0131\u015ft\u0131r. Bu \u00f6zelli\u011fi botnet\u2019in, \u00e7ok daha tehlikeli olmas\u0131na ve daha h\u0131zl\u0131 yay\u0131lmas\u0131na yol a\u00e7maktad\u0131r. As\u0131l endi\u015fe verici olan ise yeni t\u00fcr\u00fcn, yaln\u0131zca eski kurbanlar\u0131, yani y\u00f6nlendiriciler, IP kameralar ve di\u011fer \u201cak\u0131ll\u0131\u201d nesneler, ile s\u0131n\u0131rl\u0131 kalmamas\u0131 ve kurumsal IoT cihazlar\u0131n\u0131 da hedef almas\u0131d\u0131r.<\/p>\n<p>Asl\u0131nda bu durum, \u00e7ok b\u00fcy\u00fck bir s\u00fcrpriz olmad\u0131. Kaynak kodu yak\u0131n zaman \u00f6nce s\u0131zd\u0131r\u0131lan Mirai k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131, \u015fu anda yeterli programlama becerilerine sahip her t\u00fcrl\u00fc sald\u0131rgan taraf\u0131ndan kullan\u0131labiliyor. Dolay\u0131s\u0131yla Mirai ad\u0131, <a href=\"https:\/\/securelist.com\/ddos-attacks-in-q4-2018\/89565\/\" target=\"_blank\" rel=\"noopener\">Securelist\u2019in 4. \u00e7eyrek DDoS raporu<\/a>nda bir\u00e7ok yerde ge\u00e7iyor. En yeni <a href=\"https:\/\/securelist.com\/new-trends-in-the-world-of-iot-threats\/87991\/\" target=\"_blank\" rel=\"noopener\">IoT tehdit raporumuz<\/a>a g\u00f6re Mirai k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n\u0131n varyasyonlar\u0131 da t\u00fcm IoT cihaz sald\u0131r\u0131lar\u0131n\u0131n %21\u2019inde kullan\u0131lm\u0131\u015f.<\/p>\n<p>Mirai\u2019nin kodu son derece esnek ve uyarlanabilirdir, bu nedenle hedef yelpazesini geni\u015fletmek i\u00e7in k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131, g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanan yeni yaz\u0131l\u0131mlarla donatmak olduk\u00e7a kolayd\u0131r. \u015eu anda ya\u015fanan da tam olarak budur. Y\u00f6nlendiriciler, eri\u015fim noktalar\u0131, ADSL modemleri ve a\u011f kameralar\u0131 gibi normal avlar\u0131na y\u00f6nelik yeni k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m setinin yan\u0131 s\u0131ra y\u00fcksek kapasiteli, kurumsal kablosuz denetleyicilere, dijital i\u015faret sistemlerine ve kablosuz sunum sistemlerine bula\u015fabilir.<\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-mirai-variant-comes-with-27-exploits-targets-enterprise-devices\/\" target=\"_blank\" rel=\"noopener nofollow\">Palo Alto Networks analistlerine g\u00f6re<\/a> Mirai\u2019nin yeni potansiyel hedefleri aras\u0131nda a\u015fa\u011f\u0131dakiler bulunmaktad\u0131r:<\/p>\n<ul>\n<li>ePresent WiPG-1000 kablosuz sunum sistemleri,<\/li>\n<li>LG Supersign televizyonlar,<\/li>\n<li>DLink DCS-930L a\u011f video kameralar\u0131,<\/li>\n<li>DLink DIR-645, DIR-815 y\u00f6nlendiriciler,<\/li>\n<li>Zyxel P660HN-T y\u00f6nlendiriciler,<\/li>\n<li>Netgear WG102, WG103, WN604, WNDAP350, WNDAP360, WNAP320, WNAP210,<\/li>\n<li>WNDAP660, WNDAP620 cihazlar\u0131,<\/li>\n<li>Netgear DGN2200 N300 Wireless ADSL2+ modem y\u00f6nlendiricileri ve<\/li>\n<li>Netgear Prosafe WC9500, WC7600, WC7520 kablosuz denetleyiciler.<\/li>\n<\/ul>\n<p>\u00dcstelik yeni hedefler, bu kadarla da s\u0131n\u0131rl\u0131 de\u011fildir. Uzmanlar\u0131m\u0131z, end\u00fcstriyel IoT cihazlar\u0131n\u0131 bile etkileme potansiyeline sahip Mirai sald\u0131r\u0131s\u0131n\u0131n yeni dalgalar\u0131n\u0131n gelece\u011fini d\u00fc\u015f\u00fcn\u00fcyor.<\/p>\n<h2>Cihazlar\u0131n\u0131z\u0131 nas\u0131l koruyabilirsiniz?<\/h2>\n<p>G\u00fcvenlik ara\u015ft\u0131rmac\u0131m\u0131z Victor Chebyshev, cihazlar\u0131n Mirai botnet\u2019inin eline ge\u00e7mesini \u00f6nlemek i\u00e7in i\u015fletmelere baz\u0131 \u00f6nerilerde bulundu:<\/p>\n<ul>\n<li>Yamalar\u0131 ve \u00fcr\u00fcn yaz\u0131l\u0131m\u0131 g\u00fcncellemelerini, yay\u0131nlan\u0131r yay\u0131nlanmaz t\u00fcm cihazlara ve sistemlere y\u00fckleyin;<\/li>\n<li>Her cihazda gelen trafi\u011fin hacmini izleyin, \u00e7\u00fcnk\u00fc vir\u00fcsl\u00fc cihazlar\u0131n trafik hacmi, normal cihazlara k\u0131yasla \u00f6nemli \u00f6l\u00e7\u00fcde daha fazlad\u0131r;<\/li>\n<li>Mutlaka \u00f6nceden belirlenen parolalar\u0131 de\u011fi\u015ftirin ve \u00e7al\u0131\u015fanlar i\u00e7in etkili bir parola politikas\u0131 uygulay\u0131n;<\/li>\n<li>Bir tuhafl\u0131k oldu\u011funu d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fcn\u00fcz cihazlarda sistemi yeniden y\u00fckleyin fakat \u015funu akl\u0131n\u0131zdan \u00e7\u0131karmay\u0131n: Sistemi yeniden y\u00fcklemek, mevcut k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mdan kurtulman\u0131z\u0131 sa\u011flasa bile tek ba\u015f\u0131na, bu yaz\u0131l\u0131m\u0131n yay\u0131lmas\u0131 riskini d\u00fc\u015f\u00fcrmez.<\/li>\n<\/ul>\n<h2>Kaspersky IoT Tehdit Veri Ak\u0131\u015f\u0131<\/h2>\n<p>\u015eirketleri, IoT cihazlar\u0131yla ilgili en yeni tehditlerden korumak i\u00e7in yeni bir istihbarat veri ak\u0131\u015f\u0131 yay\u0131nlad\u0131k. Bu veri ak\u0131\u015f\u0131nda, \u00f6zellikle IoT tehditlerine ili\u015fkin veriler toplan\u0131yor. \u015eu anda veri ak\u0131\u015f\u0131nda 8000\u2019den fazla kay\u0131t bulunmakta ve veri taban\u0131 her saatte g\u00fcncelleniyor. Bu veri ak\u0131\u015f\u0131n\u0131 y\u00f6nlendiricilere, Web a\u011f ge\u00e7itlerine, ak\u0131ll\u0131 sistemlere ve bireysel IoT \u00fcr\u00fcnlerine uygulayabilece\u011finiz gibi genel Tehdit \u0130stihbarat\u0131 \u00e7\u00f6z\u00fcmlerinizin bir par\u00e7as\u0131 haline de getirebilirsiniz.<\/p>\n<p>Bu istihbarat ak\u0131\u015f\u0131, ara\u015ft\u0131rmac\u0131lar\u0131m\u0131z\u0131n ve analistlerimizin edindi\u011fi bilgilere ve \u201csanal sunucular\u201d (honeypot) ile korunmas\u0131z IoT cihazlar\u0131n\u0131 taklit eden di\u011fer tuzaklardan toplanan verilere dayan\u0131r. Daha fazla bilgi almak veya entegre teknoloji \u00e7\u00f6z\u00fcmlerinden sorumlu ekibimizle ileti\u015fime ge\u00e7mek i\u00e7in l\u00fctfen <a href=\"https:\/\/www.kaspersky.com\/iot-threat-data-feed?redef=1&amp;reseller=gl_bankdaily_acq_ona_smm__onl_b2b_kasperskydaily_banner_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Nesnelerin \u0130nterneti Tehdit Veri Ak\u0131\u015f\u0131 Web sayfas\u0131n\u0131<\/a> ziyaret edin.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mirai&#8217;nin yeni bir t\u00fcr\u00fc, \u00e7ok daha geni\u015f bir yelpazedeki a\u00e7\u0131klardan yararlanan yaz\u0131l\u0131mlar\u0131 i\u00e7eriyor. G\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanan bu yaz\u0131l\u0131mlar\u0131n baz\u0131lar\u0131, kurumsal IoT cihazlar\u0131n\u0131 hedef al\u0131yor.<\/p>\n","protected":false},"author":700,"featured_media":5791,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287],"tags":[392,629,1758,1063,877],"class_list":{"0":"post-5790","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-botnet","9":"tag-iot","10":"tag-mirai","11":"tag-nesnelerin-interneti","12":"tag-sistem-aciklari"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/mirai-enterprise\/5790\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/mirai-enterprise\/15432\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/mirai-enterprise\/12997\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/mirai-enterprise\/17376\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/mirai-enterprise\/15525\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/mirai-enterprise\/14215\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/mirai-enterprise\/18065\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/mirai-enterprise\/17067\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mirai-enterprise\/22432\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mirai-enterprise\/26032\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/mirai-enterprise\/11531\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/mirai-enterprise\/11616\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/mirai-enterprise\/10492\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/mirai-enterprise\/18781\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/mirai-enterprise\/22827\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/mirai-enterprise\/18125\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mirai-enterprise\/22307\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mirai-enterprise\/22239\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/botnet\/","name":"botnet"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5790"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5790\/revisions"}],"predecessor-version":[{"id":6820,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5790\/revisions\/6820"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5791"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}